CVE-2021-47794

ZesleCP 3.1.9 contains an authenticated remote code execution vulnerability that allows attackers to create malicious FTP accounts with shell injection payloads. Attackers can exploit the FTP account creation endpoint by injecting a reverse shell command that establishes a network connection to a specified listening host.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zesle:zeslecp:*:*:*:*:*:*:*:*

History

21 Jan 2026, 21:56

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/50233 - () https://www.exploit-db.com/exploits/50233 - Exploit, Third Party Advisory
References () https://www.vulncheck.com/advisories/zeslecp-remote-code-execution-rce-authenticated - () https://www.vulncheck.com/advisories/zeslecp-remote-code-execution-rce-authenticated - Third Party Advisory
References () https://www.youtube.com/watch?v=5lTDTEBVq-0 - () https://www.youtube.com/watch?v=5lTDTEBVq-0 - Exploit
References () https://zeslecp.com/ - () https://zeslecp.com/ - Product
First Time Zesle zeslecp
Zesle
CPE cpe:2.3:a:zesle:zeslecp:*:*:*:*:*:*:*:*

16 Jan 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-16 00:16

Updated : 2026-01-21 21:56


NVD link : CVE-2021-47794

Mitre link : CVE-2021-47794

CVE.ORG link : CVE-2021-47794


JSON object : View

Products Affected

zesle

  • zeslecp
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')